oss-sec mailing list archives

Re: audit log injection attack via login


From: "Steven M. Christey" <coley () linus mitre org>
Date: Wed, 23 Apr 2008 12:19:06 -0400 (EDT)


======================================================
Name: CVE-2008-1926
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1926
Reference: 
MISC:http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=blobdiff;f=login-utils/login.c;h=230121316d953c59e7842c1325f6e9f326a37608;hp=aad27794327c60391b5148b367d2c79338fc6ee4;hb=8ccf0b253ac0f4f58d64bc9674de18bff5a88782;hpb=3a4a13b12a8065b0b5354686d2807cce421a9973
Reference: 
CONFIRM:http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=commit;h=8ccf0b253ac0f4f58d64bc9674de18bff5a88782

Argument injection vulnerability in login (login-utils/login.c) in
util-linux-ng 2.14 and earlier makes it easier for remote attackers to
hide activities by modifying portions of log events, as demonstrated
by appending an "addr=" statement to the login name, aka "audit log
injection."




Current thread: